Abstract
With the development of Internet technology, distributed denial of service(DDoS) attack has always been a hot and difficult point in network security.Protecting network infrastructure and information security is also becoming more and more important.However, cyber security is an arms race, as attacks develop and network traffic surges, intelligent solutions face the challenge of detecting sensitive changes in traffic characteristics.In this paper, we propose a lightweight Adaptive Clustering-based LightGBM(AcLGB) detection method.This is a new DDoS traffic classification method and an effective lightweight detection method.We introduce a new clustering technique to learn the clustering centers that can be used to extend the characteristics of a given dataset.It solves the challenge of difficult detection when traffic characteristics change sensitively.The model separates the samples of different categories in the best way, and outperforms the current detection method with 99.98% detection accuracy. In the CIC-DDoS2019 data set, the detection time of 802s is better than other detection methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“NexusGuard” [online] Available: https://www.netscout.com/
“CIC-DDoS2019” [online] Available: https://www.unb.ca/cic/datasets/ddos-2019.html
Yu, Y., Long, J., Cai, Z.: Session-based network intrusion detection using a deep learning architecture. In: International Conference on Modeling Decisions for Artificial Intelligence, pp. 144–155 (2017)
Yu, Y., Long, J., Cai, Z.: Network intrusion detection through stacking dilated convolutional autoencoders. In: Security and Communication Networks, pp. 1–10 (2017)
Yousefi-Azar, M., Varadharajan, V., Hamey, L., Tupakula, U.: Autoencoder-based feature learning for cyber security applications. In: IEEE International Joint Conference on Neural Networks, pp. 3854–3861 (2017)
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Hu, J.: Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519–2533 (2014)
Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., et al.: HAST-IDS: Learning Hierarchical Spatial-Temporal Features using Deep Neural Networks to Improve Intrusion Detection (2017)
Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. In: Security and Communication Networks, pp. 1–9 (2018)
Dong, S., Sarem, M.: DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks. 8, 5039–5048 (2018)
Li, Y., Xia, J., Zhang, S., et al.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424–430 (2012)
Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Secure-display path for security-sensitive applications on mobile. Comput. Mater. Continua 55(1), 17–35 (2018)
de Assis, M.V.O., Carvalho, L.F., Rodrigues, J.J.P.C., et al.: Near real-time security system applied to SDN environments in IoT networks using convolutional neural network. Comput. Electr. Eng. 86, 106738 (2020)
Javaid, A., Niyaz, Q., Sun, W., et al.: A deep learning approach for network intrusion detection system. Eai Endorsed Trans. Secur. Saf. 3(9), 2 (2016)
Sadaf, K., Sultana, J.: Intrusion detection based on autoencoder and isolation Forest in fog computing. 8, 167059–167068 (2020)
Wei, Y., Jang-Jaccard, J., Sabrina, F., et al.: AE-MLP: a hybrid deep learning approach for DDoS detection and classification. IEEE 9, 146810–146821 (2021)
“PyTorch”, [online] Available: https://pytorch.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zeng, F., Cheng, J., Cao, Z., Yang, Y., Sheng, V.S. (2024). AcLGB: A Lightweight DDoS Attack Detection Method. In: Qiu, X., Xiao, Y., Wu, Z., Zhang, Y., Tian, Y., Liu, B. (eds) The 7th International Conference on Information Science, Communication and Computing. ISCC2023 2023. Smart Innovation, Systems and Technologies, vol 350. Springer, Singapore. https://doi.org/10.1007/978-981-99-7161-9_16
Download citation
DOI: https://doi.org/10.1007/978-981-99-7161-9_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7160-2
Online ISBN: 978-981-99-7161-9
eBook Packages: EngineeringEngineering (R0)